schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103542", "label": "fraudulent", "label_confidence": 0.785, "severity": "high", "timestamp": "2026-01-03T11:02:00Z", "trace_id": "08716bbe-bf3d-aa27-7a17-d832bbd0b4c5" }
{ "account_age_days": 1217, "account_id": "ACCT-C6082C1AE27E", "baseline_risk_score": 0.305, "kyc_tier": "tier_2", "session_entropy": 0.275 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 388, "timestamp": "2026-01-03T09:29:00Z", "transaction_amount_usd": 18.63 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.814, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2859780.99, "financial_exposure_usd": 5977211.89, "recoverable_pct": 0.891 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109377", "label": "benign", "label_confidence": 0.578, "severity": "low", "timestamp": "2026-01-07T12:17:00Z", "trace_id": "d5da5720-6c4a-f434-dd53-6692b67dc76b" }
{ "account_age_days": 918, "account_id": "ACCT-851FEB4A9860", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.685 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 289, "timestamp": "2026-01-07T03:56:00Z", "transaction_amount_usd": 0.18 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.693, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1165.58, "financial_exposure_usd": 1642.94, "recoverable_pct": 0.887 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109585", "label": "benign", "label_confidence": 0.708, "severity": "low", "timestamp": "2026-01-07T15:45:00Z", "trace_id": "124e51b3-35da-c1f3-937b-fc157c990bb3" }
{ "account_age_days": 1916, "account_id": "ACCT-C88DB890D87C", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.45 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 778, "timestamp": "2026-01-07T15:45:00Z", "transaction_amount_usd": 6411.7 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.771, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 968, "financial_exposure_usd": 1524.84, "recoverable_pct": 0.736 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108931", "label": "benign", "label_confidence": 0.588, "severity": "high", "timestamp": "2026-01-07T04:51:00Z", "trace_id": "0978c09e-ba0a-832a-4841-79fba51e8c70" }
{ "account_age_days": 970, "account_id": "ACCT-FA9F2AE3519A", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.947 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 110, "timestamp": "2026-01-06T16:58:00Z", "transaction_amount_usd": 20.69 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.684, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2422.29, "financial_exposure_usd": 5654.01, "recoverable_pct": 0.5 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103413", "label": "fraudulent", "label_confidence": 0.853, "severity": "high", "timestamp": "2026-01-03T08:53:00Z", "trace_id": "997b4117-592b-ce9a-ae6b-8eaffb2d5cea" }
{ "account_age_days": 1939, "account_id": "ACCT-797F0EFCB964", "baseline_risk_score": 0.184, "kyc_tier": "tier_3", "session_entropy": 0.904 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 320, "timestamp": "2026-01-02T23:09:00Z", "transaction_amount_usd": 14.19 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.911, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2045596.86, "financial_exposure_usd": 2193785.87, "recoverable_pct": 0.626 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100279", "label": "fraudulent", "label_confidence": 0.945, "severity": "high", "timestamp": "2026-01-01T04:39:00Z", "trace_id": "38ac7355-f495-dd71-1802-f730e8ec6834" }
{ "account_age_days": 715, "account_id": "ACCT-37CCA228020F", "baseline_risk_score": 0.554, "kyc_tier": "tier_1", "session_entropy": 0.237 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 578, "timestamp": "2026-01-01T04:39:00Z", "transaction_amount_usd": 74037.15 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.646, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 760935.09, "financial_exposure_usd": 1294410.73, "recoverable_pct": 0.111 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105756", "label": "fraudulent", "label_confidence": 0.679, "severity": "medium", "timestamp": "2026-01-04T23:56:00Z", "trace_id": "a27c1447-8319-f7f2-7b05-654713fec8b4" }
{ "account_age_days": 1146, "account_id": "ACCT-9DB1475B7B73", "baseline_risk_score": 0.162, "kyc_tier": "tier_1", "session_entropy": 0.26 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 644, "timestamp": "2026-01-04T23:56:00Z", "transaction_amount_usd": 2056493.2 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.536, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3570571.24, "financial_exposure_usd": 4517917.4, "recoverable_pct": 0.461 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104321", "label": "fraudulent", "label_confidence": 0.891, "severity": "medium", "timestamp": "2026-01-04T00:01:00Z", "trace_id": "5c880b0e-1eac-bbb6-88ef-295022d212b8" }
{ "account_age_days": 843, "account_id": "ACCT-DA26034351EB", "baseline_risk_score": 0.179, "kyc_tier": "tier_1", "session_entropy": 0.716 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 214, "timestamp": "2026-01-04T00:01:00Z", "transaction_amount_usd": 202060.35 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.601, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3045698.71, "financial_exposure_usd": 5017617.54, "recoverable_pct": 0.761 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109807", "label": "benign", "label_confidence": 0.702, "severity": "high", "timestamp": "2026-01-07T19:27:00Z", "trace_id": "028a60b9-19b9-53e8-b1e1-0a86aaf9d2a1" }
{ "account_age_days": 1702, "account_id": "ACCT-7DD244D1E3BE", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.651 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 799, "timestamp": "2026-01-07T19:27:00Z", "transaction_amount_usd": 1363.75 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.739, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 676.63, "financial_exposure_usd": 1085.98, "recoverable_pct": 0.745 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102350", "label": "fraudulent", "label_confidence": 0.833, "severity": "high", "timestamp": "2026-01-02T15:10:00Z", "trace_id": "a015c8c0-cc42-a4ce-5370-eda339562202" }
{ "account_age_days": 557, "account_id": "ACCT-562BF345E0AC", "baseline_risk_score": 0.566, "kyc_tier": "tier_1", "session_entropy": 0.315 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 743, "timestamp": "2026-01-02T15:10:00Z", "transaction_amount_usd": 49099.95 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.46, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 501623.61, "financial_exposure_usd": 776403.22, "recoverable_pct": 0.218 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109250", "label": "benign", "label_confidence": 0.46, "severity": "medium", "timestamp": "2026-01-07T10:10:00Z", "trace_id": "e22f9ef7-9a2e-df1b-5af2-115dc59a5d9e" }
{ "account_age_days": 970, "account_id": "ACCT-4DB944C75BC0", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.417 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 255, "timestamp": "2026-01-07T10:10:00Z", "transaction_amount_usd": 5389.36 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.695, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 399.13, "financial_exposure_usd": 417.79, "recoverable_pct": 0.639 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105739", "label": "fraudulent", "label_confidence": 0.779, "severity": "medium", "timestamp": "2026-01-04T23:39:00Z", "trace_id": "a976d135-5975-470d-8aaf-12a060f1c52d" }
{ "account_age_days": 1343, "account_id": "ACCT-639B21FCD329", "baseline_risk_score": 0.182, "kyc_tier": "tier_3", "session_entropy": 0.393 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 328, "timestamp": "2026-01-04T23:39:00Z", "transaction_amount_usd": 1436430.53 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.829, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 597360.76, "financial_exposure_usd": 1364493.11, "recoverable_pct": 0.439 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106177", "label": "fraudulent", "label_confidence": 0.619, "severity": "high", "timestamp": "2026-01-05T06:57:00Z", "trace_id": "edc91a7d-5c71-caac-51bf-592817ae5bb3" }
{ "account_age_days": 1306, "account_id": "ACCT-12A73A25A179", "baseline_risk_score": 0.299, "kyc_tier": "tier_2", "session_entropy": 0.108 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 119, "timestamp": "2026-01-05T06:57:00Z", "transaction_amount_usd": 2652656.51 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.493, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3081853.98, "financial_exposure_usd": 3910218.07, "recoverable_pct": 0.68 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106687", "label": "benign", "label_confidence": 0.546, "severity": "high", "timestamp": "2026-01-05T15:27:00Z", "trace_id": "8455c155-91cb-5a69-e671-2910dbe44903" }
{ "account_age_days": 668, "account_id": "ACCT-D7D9CB7D90FE", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.495 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 213, "timestamp": "2026-01-05T11:13:00Z", "transaction_amount_usd": 11.03 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.48, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 734.09, "financial_exposure_usd": 1650.51, "recoverable_pct": 0.725 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108368", "label": "benign", "label_confidence": 0.52, "severity": "low", "timestamp": "2026-01-06T19:28:00Z", "trace_id": "9592d342-1356-5035-eb24-2ab4029bfa2f" }
{ "account_age_days": 1956, "account_id": "ACCT-F11FD5925720", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.102 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 434, "timestamp": "2026-01-06T19:28:00Z", "transaction_amount_usd": 4703.78 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.628, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 774.77, "financial_exposure_usd": 1360.12, "recoverable_pct": 0.832 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102573", "label": "fraudulent", "label_confidence": 0.792, "severity": "high", "timestamp": "2026-01-02T18:53:00Z", "trace_id": "005bfefc-b48b-f460-08e4-db7978412ee3" }
{ "account_age_days": 543, "account_id": "ACCT-BD56EA046736", "baseline_risk_score": 0.333, "kyc_tier": "tier_1", "session_entropy": 0.167 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 279, "timestamp": "2026-01-02T18:53:00Z", "transaction_amount_usd": 45746.7 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.416, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 88404.56, "financial_exposure_usd": 168816.15, "recoverable_pct": 0.232 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106480", "label": "fraudulent", "label_confidence": 0.831, "severity": "medium", "timestamp": "2026-01-05T12:00:00Z", "trace_id": "60d443c3-e323-b03e-dc31-c3541b6757a4" }
{ "account_age_days": 63, "account_id": "ACCT-151DF7EF62FF", "baseline_risk_score": 0.192, "kyc_tier": "tier_1", "session_entropy": 0.32 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 449, "timestamp": "2026-01-05T12:00:00Z", "transaction_amount_usd": 353208.23 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.765, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3869435.57, "financial_exposure_usd": 4245175.86, "recoverable_pct": 0.964 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106936", "label": "benign", "label_confidence": 0.514, "severity": "high", "timestamp": "2026-01-05T19:36:00Z", "trace_id": "98de0933-1994-de67-bcf0-0425aeb94109" }
{ "account_age_days": 819, "account_id": "ACCT-2CDE32F0FAF6", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.81 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 383, "timestamp": "2026-01-05T18:22:00Z", "transaction_amount_usd": 6.13 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.498, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 431.73, "financial_exposure_usd": 995.26, "recoverable_pct": 0.45 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106942", "label": "benign", "label_confidence": 0.597, "severity": "medium", "timestamp": "2026-01-05T19:42:00Z", "trace_id": "2ffc69a7-c0b4-37d3-6f60-95cc7f5cd3c7" }
{ "account_age_days": 858, "account_id": "ACCT-8B8604A7A89A", "baseline_risk_score": 0.133, "kyc_tier": "tier_1", "session_entropy": 0.234 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 360, "timestamp": "2026-01-05T17:30:00Z", "transaction_amount_usd": 13.06 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.679, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2804.73, "financial_exposure_usd": 3602.67, "recoverable_pct": 0.406 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104183", "label": "fraudulent", "label_confidence": 0.843, "severity": "medium", "timestamp": "2026-01-03T21:43:00Z", "trace_id": "70720a68-e27e-95ca-b1bb-1c9baa185cac" }
{ "account_age_days": 23, "account_id": "ACCT-A90D2CF3E82C", "baseline_risk_score": 0.303, "kyc_tier": "tier_2", "session_entropy": 0.807 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "BR", "latency_ms": 192, "timestamp": "2026-01-03T21:43:00Z", "transaction_amount_usd": 2870074.61 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.4, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste...
{ "customer_funds_at_risk_usd": 4089977.44, "financial_exposure_usd": 6101118.41, "recoverable_pct": 0.42 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109471", "label": "benign", "label_confidence": 0.601, "severity": "low", "timestamp": "2026-01-07T13:51:00Z", "trace_id": "c79f439f-43cb-9b09-d731-5af21965066d" }
{ "account_age_days": 1710, "account_id": "ACCT-816DE8A813DC", "baseline_risk_score": 0.11, "kyc_tier": "tier_2", "session_entropy": 0.426 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 192, "timestamp": "2026-01-07T12:37:00Z", "transaction_amount_usd": 22.85 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.572, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2877.84, "financial_exposure_usd": 3045.31, "recoverable_pct": 0.95 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101833", "label": "fraudulent", "label_confidence": 0.916, "severity": "high", "timestamp": "2026-01-02T06:33:00Z", "trace_id": "6b636d09-2bc3-2cb9-cb56-a4332f6f5383" }
{ "account_age_days": 908, "account_id": "ACCT-C64D7DB24260", "baseline_risk_score": 0.647, "kyc_tier": "tier_1", "session_entropy": 0.552 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 393, "timestamp": "2026-01-02T04:48:00Z", "transaction_amount_usd": 11.38 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.532, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 650449.27, "financial_exposure_usd": 856340.56, "recoverable_pct": 0.61 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102810", "label": "fraudulent", "label_confidence": 0.946, "severity": "critical", "timestamp": "2026-01-02T22:50:00Z", "trace_id": "0bc4cd40-f503-8ab8-7637-4378544d41be" }
{ "account_age_days": 1462, "account_id": "ACCT-D7E90D13C475", "baseline_risk_score": 0.611, "kyc_tier": "tier_3", "session_entropy": 0.616 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1168, "timestamp": "2026-01-02T22:50:00Z", "transaction_amount_usd": 52516.21 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.707, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 544971.63, "financial_exposure_usd": 958340.7, "recoverable_pct": 0.717 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102315", "label": "fraudulent", "label_confidence": 0.863, "severity": "low", "timestamp": "2026-01-02T14:35:00Z", "trace_id": "a3f76aca-dfc5-896f-4304-c21cded739ec" }
{ "account_age_days": 1056, "account_id": "ACCT-11097B105D0B", "baseline_risk_score": 0.362, "kyc_tier": "tier_3", "session_entropy": 0.306 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 380, "timestamp": "2026-01-02T11:02:00Z", "transaction_amount_usd": 21.73 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.63, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 1133099.15, "financial_exposure_usd": 1273951.14, "recoverable_pct": 0.171 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106858", "label": "benign", "label_confidence": 0.583, "severity": "medium", "timestamp": "2026-01-05T18:18:00Z", "trace_id": "10cc2750-f747-8a76-cb53-5d2dfe834889" }
{ "account_age_days": 50, "account_id": "ACCT-1B0C82EC6530", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.623 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 745, "timestamp": "2026-01-05T18:18:00Z", "transaction_amount_usd": 328.93 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.497, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 142.15, "financial_exposure_usd": 345.62, "recoverable_pct": 0.487 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102651", "label": "fraudulent", "label_confidence": 0.758, "severity": "critical", "timestamp": "2026-01-02T20:11:00Z", "trace_id": "72ef5aee-6be2-d675-23ad-1438452037eb" }
{ "account_age_days": 743, "account_id": "ACCT-4C4614FA5CE8", "baseline_risk_score": 0.382, "kyc_tier": "tier_3", "session_entropy": 0.233 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 958, "timestamp": "2026-01-02T20:11:00Z", "transaction_amount_usd": 40829.85 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.772, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 123260.49, "financial_exposure_usd": 138728.57, "recoverable_pct": 0.056 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101539", "label": "fraudulent", "label_confidence": 0.92, "severity": "critical", "timestamp": "2026-01-02T01:39:00Z", "trace_id": "d5e94c8d-3bf1-7042-d60c-82f7039455fa" }
{ "account_age_days": 1234, "account_id": "ACCT-165A6A56DE1F", "baseline_risk_score": 0.294, "kyc_tier": "tier_1", "session_entropy": 0.138 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 135, "timestamp": "2026-01-02T01:39:00Z", "transaction_amount_usd": 66041.34 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.874, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 306690.22, "financial_exposure_usd": 395560.52, "recoverable_pct": 0.374 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103833", "label": "fraudulent", "label_confidence": 0.623, "severity": "low", "timestamp": "2026-01-03T15:53:00Z", "trace_id": "dea489e2-5b94-9cff-4698-eb0367b29144" }
{ "account_age_days": 1786, "account_id": "ACCT-296B3A811D47", "baseline_risk_score": 0.278, "kyc_tier": "tier_3", "session_entropy": 0.321 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 328, "timestamp": "2026-01-03T03:43:00Z", "transaction_amount_usd": 3.86 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.816, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2878052.04, "financial_exposure_usd": 3505572.4, "recoverable_pct": 0.913 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105783", "label": "fraudulent", "label_confidence": 0.883, "severity": "critical", "timestamp": "2026-01-05T00:23:00Z", "trace_id": "ead5d46f-6295-e0f9-1dc3-0c8ed35023aa" }
{ "account_age_days": 1188, "account_id": "ACCT-0FBAC16499A2", "baseline_risk_score": 0.134, "kyc_tier": "tier_2", "session_entropy": 0.251 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 817, "timestamp": "2026-01-05T00:23:00Z", "transaction_amount_usd": 389709.18 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.576, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1947196.41, "financial_exposure_usd": 4066302.48, "recoverable_pct": 0.654 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100065", "label": "fraudulent", "label_confidence": 0.948, "severity": "medium", "timestamp": "2026-01-01T01:05:00Z", "trace_id": "cfa9026b-6a24-1f46-3af7-fa21a93e7b5b" }
{ "account_age_days": 200, "account_id": "ACCT-D3966F0A6B77", "baseline_risk_score": 0.331, "kyc_tier": "tier_1", "session_entropy": 0.227 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 921, "timestamp": "2026-01-01T01:05:00Z", "transaction_amount_usd": 58041.24 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.891, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 649094.49, "financial_exposure_usd": 700473.08, "recoverable_pct": 0.452 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100388", "label": "fraudulent", "label_confidence": 0.91, "severity": "critical", "timestamp": "2026-01-01T06:28:00Z", "trace_id": "a231a9d9-fc25-c2dc-69c5-5a32ec93993b" }
{ "account_age_days": 1733, "account_id": "ACCT-51FD198F3C06", "baseline_risk_score": 0.602, "kyc_tier": "tier_3", "session_entropy": 0.864 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 505, "timestamp": "2026-01-01T06:28:00Z", "transaction_amount_usd": 81614.05 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.579, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 978415.02, "financial_exposure_usd": 1102943.88, "recoverable_pct": 0.076 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101671", "label": "fraudulent", "label_confidence": 0.769, "severity": "high", "timestamp": "2026-01-02T03:51:00Z", "trace_id": "e03e8e34-f33d-d3f9-778a-57560e02f508" }
{ "account_age_days": 1607, "account_id": "ACCT-7B6DE8DA1377", "baseline_risk_score": 0.275, "kyc_tier": "tier_3", "session_entropy": 0.135 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 364, "timestamp": "2026-01-02T03:51:00Z", "transaction_amount_usd": 90433.42 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.925, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 222938.93, "financial_exposure_usd": 533265.92, "recoverable_pct": 0.252 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101276", "label": "fraudulent", "label_confidence": 0.944, "severity": "critical", "timestamp": "2026-01-01T21:16:00Z", "trace_id": "6fd806d8-e490-af51-1657-3540df30a58c" }
{ "account_age_days": 1455, "account_id": "ACCT-E33989C79FF5", "baseline_risk_score": 0.518, "kyc_tier": "tier_3", "session_entropy": 0.568 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 166, "timestamp": "2026-01-01T21:16:00Z", "transaction_amount_usd": 66446.59 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.884, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 565020.87, "financial_exposure_usd": 734240.74, "recoverable_pct": 0.567 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100808", "label": "fraudulent", "label_confidence": 0.816, "severity": "medium", "timestamp": "2026-01-01T13:28:00Z", "trace_id": "d56ca7ea-e169-4577-97cf-4a07048298ff" }
{ "account_age_days": 1514, "account_id": "ACCT-B12BDCC3EDFC", "baseline_risk_score": 0.632, "kyc_tier": "tier_3", "session_entropy": 0.903 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 140, "timestamp": "2026-01-01T02:30:00Z", "transaction_amount_usd": 23.59 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.544, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 239119.89, "financial_exposure_usd": 484697.5, "recoverable_pct": 0.222 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105123", "label": "fraudulent", "label_confidence": 0.762, "severity": "high", "timestamp": "2026-01-04T13:23:00Z", "trace_id": "177e93ac-ede9-64e0-25f1-498efca1611a" }
{ "account_age_days": 1798, "account_id": "ACCT-5029A82E61E4", "baseline_risk_score": 0.395, "kyc_tier": "tier_2", "session_entropy": 0.259 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 80, "timestamp": "2026-01-04T13:23:00Z", "transaction_amount_usd": 1940409.26 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.61, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 813568.25, "financial_exposure_usd": 1869193.88, "recoverable_pct": 0.452 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109338", "label": "benign", "label_confidence": 0.629, "severity": "low", "timestamp": "2026-01-07T11:38:00Z", "trace_id": "176006cb-0ac9-b99d-bf2f-41e16132f127" }
{ "account_age_days": 490, "account_id": "ACCT-31EBBE9CAF35", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.833 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 149, "timestamp": "2026-01-07T11:38:00Z", "transaction_amount_usd": 13183.91 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.699, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1622.7, "financial_exposure_usd": 1938.91, "recoverable_pct": 0.608 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103898", "label": "fraudulent", "label_confidence": 0.843, "severity": "low", "timestamp": "2026-01-03T16:58:00Z", "trace_id": "1007dd07-54aa-fd23-d293-cefd1ffe11d5" }
{ "account_age_days": 1547, "account_id": "ACCT-33E7F7A6A05A", "baseline_risk_score": 0.098, "kyc_tier": "tier_2", "session_entropy": 0.185 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 366, "timestamp": "2026-01-03T16:58:00Z", "transaction_amount_usd": 831870.83 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.869, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4353447.27, "financial_exposure_usd": 6265893.7, "recoverable_pct": 0.452 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101289", "label": "fraudulent", "label_confidence": 0.804, "severity": "medium", "timestamp": "2026-01-01T21:29:00Z", "trace_id": "56dea7bf-a4e5-d90f-1844-4234c9ad73e0" }
{ "account_age_days": 1739, "account_id": "ACCT-85A9EACA8B8D", "baseline_risk_score": 0.543, "kyc_tier": "tier_2", "session_entropy": 0.761 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 728, "timestamp": "2026-01-01T21:29:00Z", "transaction_amount_usd": 43413.02 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.408, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 630162.27, "financial_exposure_usd": 838074.06, "recoverable_pct": 0.11 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107819", "label": "benign", "label_confidence": 0.739, "severity": "high", "timestamp": "2026-01-06T10:19:00Z", "trace_id": "b60afc32-4cf1-0229-ce8e-bf66e21e3aaf" }
{ "account_age_days": 1232, "account_id": "ACCT-322E44262844", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.663 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 635, "timestamp": "2026-01-06T10:19:00Z", "transaction_amount_usd": 3914.06 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.638, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2044.64, "financial_exposure_usd": 2802.67, "recoverable_pct": 0.695 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103153", "label": "fraudulent", "label_confidence": 0.774, "severity": "high", "timestamp": "2026-01-03T04:33:00Z", "trace_id": "b53032bd-9e6b-0981-5832-9730027d0b80" }
{ "account_age_days": 608, "account_id": "ACCT-294BA977AAE2", "baseline_risk_score": 0.34, "kyc_tier": "tier_1", "session_entropy": 0.397 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 1061, "timestamp": "2026-01-03T04:33:00Z", "transaction_amount_usd": 102682.47 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE",...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.867, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 547270.23, "financial_exposure_usd": 859587.28, "recoverable_pct": 0.103 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105870", "label": "fraudulent", "label_confidence": 0.893, "severity": "medium", "timestamp": "2026-01-05T01:50:00Z", "trace_id": "21c428fc-ce53-8773-55ee-d5a733f2b9bb" }
{ "account_age_days": 966, "account_id": "ACCT-8143B4E47D67", "baseline_risk_score": 0.179, "kyc_tier": "tier_2", "session_entropy": 0.715 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 285, "timestamp": "2026-01-04T16:52:00Z", "transaction_amount_usd": 17.55 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.697, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2530574.66, "financial_exposure_usd": 4864238.07, "recoverable_pct": 0.786 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103015", "label": "fraudulent", "label_confidence": 0.914, "severity": "high", "timestamp": "2026-01-03T02:15:00Z", "trace_id": "b0eb2fb2-f689-ee29-906a-3be3fa6b4208" }
{ "account_age_days": 1471, "account_id": "ACCT-FF56C76B8674", "baseline_risk_score": 0.539, "kyc_tier": "tier_3", "session_entropy": 0.369 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 599, "timestamp": "2026-01-03T02:15:00Z", "transaction_amount_usd": 33752.63 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.434, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 356370.12, "financial_exposure_usd": 668650.01, "recoverable_pct": 0.84 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108518", "label": "benign", "label_confidence": 0.468, "severity": "low", "timestamp": "2026-01-06T21:58:00Z", "trace_id": "f9f98cb4-3d35-14fb-a141-9c6504e04dc3" }
{ "account_age_days": 55, "account_id": "ACCT-9E1B4C13E295", "baseline_risk_score": 0.166, "kyc_tier": "tier_2", "session_entropy": 0.793 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 363, "timestamp": "2026-01-06T10:47:00Z", "transaction_amount_usd": 17.86 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.628, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1178.98, "financial_exposure_usd": 2657.07, "recoverable_pct": 0.488 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108647", "label": "benign", "label_confidence": 0.709, "severity": "medium", "timestamp": "2026-01-07T00:07:00Z", "trace_id": "18751716-5678-fdfe-0fd2-a0829ca81755" }
{ "account_age_days": 93, "account_id": "ACCT-7B55B9793C67", "baseline_risk_score": 0.054, "kyc_tier": "tier_1", "session_entropy": 0.509 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 366, "timestamp": "2026-01-07T00:07:00Z", "transaction_amount_usd": 5235.05 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.594, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 876.19, "financial_exposure_usd": 1280.2, "recoverable_pct": 0.656 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107667", "label": "benign", "label_confidence": 0.643, "severity": "medium", "timestamp": "2026-01-06T07:47:00Z", "trace_id": "819617e7-4701-bf4d-544d-76edff0afca3" }
{ "account_age_days": 354, "account_id": "ACCT-3A070E5930F2", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.674 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 221, "timestamp": "2026-01-06T02:59:00Z", "transaction_amount_usd": 11.08 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.609, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1250.17, "financial_exposure_usd": 2487.42, "recoverable_pct": 0.759 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101677", "label": "fraudulent", "label_confidence": 0.962, "severity": "medium", "timestamp": "2026-01-02T03:57:00Z", "trace_id": "b7f84bc2-7f9d-44f6-22bb-0818799ea4f0" }
{ "account_age_days": 918, "account_id": "ACCT-56817EDC9770", "baseline_risk_score": 0.592, "kyc_tier": "tier_3", "session_entropy": 0.314 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 395, "timestamp": "2026-01-02T03:57:00Z", "transaction_amount_usd": 94534.82 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.737, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 266382.61, "financial_exposure_usd": 270075.78, "recoverable_pct": 0.658 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103827", "label": "fraudulent", "label_confidence": 0.617, "severity": "high", "timestamp": "2026-01-03T15:47:00Z", "trace_id": "6e052566-b146-7ae1-ed59-979de0b8f854" }
{ "account_age_days": 1626, "account_id": "ACCT-41E58B4A0DDB", "baseline_risk_score": 0.194, "kyc_tier": "tier_1", "session_entropy": 0.735 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 190, "timestamp": "2026-01-03T15:47:00Z", "transaction_amount_usd": 2039680.63 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.392, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2695155.59, "financial_exposure_usd": 3038613.2, "recoverable_pct": 0.454 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100411", "label": "fraudulent", "label_confidence": 0.942, "severity": "high", "timestamp": "2026-01-01T06:51:00Z", "trace_id": "c9ec979e-0ee5-76d1-969e-cc239f3ac133" }
{ "account_age_days": 1819, "account_id": "ACCT-8C30BB021636", "baseline_risk_score": 0.544, "kyc_tier": "tier_2", "session_entropy": 0.187 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CA", "latency_ms": 843, "timestamp": "2026-01-01T06:51:00Z", "transaction_amount_usd": 6058.1 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.479, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 1169132.45, "financial_exposure_usd": 1339928.81, "recoverable_pct": 0.235 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105503", "label": "fraudulent", "label_confidence": 0.905, "severity": "critical", "timestamp": "2026-01-04T19:43:00Z", "trace_id": "ab20fdbc-e0cb-8585-6c6d-9aa9a6e87786" }
{ "account_age_days": 918, "account_id": "ACCT-0608B13EE681", "baseline_risk_score": 0.394, "kyc_tier": "tier_3", "session_entropy": 0.626 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 750, "timestamp": "2026-01-04T19:43:00Z", "transaction_amount_usd": 438634.06 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.409, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 7639139.59, "financial_exposure_usd": 7707890.87, "recoverable_pct": 0.837 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102555", "label": "fraudulent", "label_confidence": 0.91, "severity": "high", "timestamp": "2026-01-02T18:35:00Z", "trace_id": "7f3294f7-f542-110e-c6e5-ab15bb2b2236" }
{ "account_age_days": 1364, "account_id": "ACCT-3AE1CF620C54", "baseline_risk_score": 0.524, "kyc_tier": "tier_1", "session_entropy": 0.896 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 222, "timestamp": "2026-01-02T12:52:00Z", "transaction_amount_usd": 6.82 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.459, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 395334.61, "financial_exposure_usd": 701069.54, "recoverable_pct": 0.805 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108907", "label": "benign", "label_confidence": 0.669, "severity": "medium", "timestamp": "2026-01-07T04:27:00Z", "trace_id": "455e72cb-6ce6-ed6e-ae22-f51ad43975c4" }
{ "account_age_days": 725, "account_id": "ACCT-2F252F5B4F2B", "baseline_risk_score": 0.191, "kyc_tier": "tier_1", "session_entropy": 0.717 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1182, "timestamp": "2026-01-07T04:27:00Z", "transaction_amount_usd": 12754.22 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.636, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 796.8, "financial_exposure_usd": 1577.17, "recoverable_pct": 0.734 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107208", "label": "benign", "label_confidence": 0.623, "severity": "medium", "timestamp": "2026-01-06T00:08:00Z", "trace_id": "642f3865-d58d-2dc6-32c6-1f737afb36e9" }
{ "account_age_days": 1133, "account_id": "ACCT-C8AD7910FE9D", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.846 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 149, "timestamp": "2026-01-06T00:08:00Z", "transaction_amount_usd": 9054.24 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.458, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1661.43, "financial_exposure_usd": 3118.07, "recoverable_pct": 0.474 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104407", "label": "fraudulent", "label_confidence": 0.771, "severity": "low", "timestamp": "2026-01-04T01:27:00Z", "trace_id": "ecf5eb00-4573-b05c-c321-0051a035530e" }
{ "account_age_days": 1303, "account_id": "ACCT-25859BF1B29C", "baseline_risk_score": 0.281, "kyc_tier": "tier_2", "session_entropy": 0.245 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 287, "timestamp": "2026-01-03T16:19:00Z", "transaction_amount_usd": 24.87 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.521, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2813815.62, "financial_exposure_usd": 5265909.45, "recoverable_pct": 0.689 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102173", "label": "fraudulent", "label_confidence": 0.777, "severity": "high", "timestamp": "2026-01-02T12:13:00Z", "trace_id": "c89bfb2c-8413-0bc0-6c6b-11b70051fcd8" }
{ "account_age_days": 1602, "account_id": "ACCT-772C454145DC", "baseline_risk_score": 0.271, "kyc_tier": "tier_1", "session_entropy": 0.229 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 774, "timestamp": "2026-01-02T12:13:00Z", "transaction_amount_usd": 88770.35 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.454, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 184019.71, "financial_exposure_usd": 402213.26, "recoverable_pct": 0.532 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107143", "label": "benign", "label_confidence": 0.45, "severity": "high", "timestamp": "2026-01-05T23:03:00Z", "trace_id": "d8cc39f0-1dd0-3eaf-c0fb-04774af226e4" }
{ "account_age_days": 468, "account_id": "ACCT-1B567D116F39", "baseline_risk_score": 0.168, "kyc_tier": "tier_3", "session_entropy": 0.584 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 690, "timestamp": "2026-01-05T23:03:00Z", "transaction_amount_usd": 9650.43 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.517, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3276.15, "financial_exposure_usd": 4064.84, "recoverable_pct": 0.528 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101831", "label": "fraudulent", "label_confidence": 0.821, "severity": "high", "timestamp": "2026-01-02T06:31:00Z", "trace_id": "713f054f-f424-5ba3-8621-da0b931bfe7d" }
{ "account_age_days": 1497, "account_id": "ACCT-1C070B4DF320", "baseline_risk_score": 0.34, "kyc_tier": "tier_1", "session_entropy": 0.38 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 345, "timestamp": "2026-01-02T06:31:00Z", "transaction_amount_usd": 50059.27 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.498, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 267024.23, "financial_exposure_usd": 504783.01, "recoverable_pct": 0.222 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106004", "label": "fraudulent", "label_confidence": 0.729, "severity": "low", "timestamp": "2026-01-05T04:04:00Z", "trace_id": "389dbb76-bcf5-e895-5033-3f8d255854bc" }
{ "account_age_days": 633, "account_id": "ACCT-433AD6D4750E", "baseline_risk_score": 0.337, "kyc_tier": "tier_1", "session_entropy": 0.612 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 974, "timestamp": "2026-01-05T04:04:00Z", "transaction_amount_usd": 2546079.02 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.639, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3811775.44, "financial_exposure_usd": 4043491.6, "recoverable_pct": 0.522 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104878", "label": "fraudulent", "label_confidence": 0.752, "severity": "medium", "timestamp": "2026-01-04T09:18:00Z", "trace_id": "4bbdca43-911b-f0cf-cf9d-82ed27b29cf4" }
{ "account_age_days": 67, "account_id": "ACCT-8D9EB38C485C", "baseline_risk_score": 0.227, "kyc_tier": "tier_1", "session_entropy": 0.616 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "DE", "latency_ms": 538, "timestamp": "2026-01-04T09:18:00Z", "transaction_amount_usd": 821676.95 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.424, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2264610.09, "financial_exposure_usd": 3682529.87, "recoverable_pct": 0.744 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101952", "label": "fraudulent", "label_confidence": 0.961, "severity": "high", "timestamp": "2026-01-02T08:32:00Z", "trace_id": "8bb7f9a8-bc36-d0cf-4521-a83635394502" }
{ "account_age_days": 114, "account_id": "ACCT-133DAAD759A3", "baseline_risk_score": 0.375, "kyc_tier": "tier_3", "session_entropy": 0.535 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 209, "timestamp": "2026-01-02T08:32:00Z", "transaction_amount_usd": 53429.94 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.691, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 617405.64, "financial_exposure_usd": 940246.88, "recoverable_pct": 0.359 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108164", "label": "benign", "label_confidence": 0.666, "severity": "medium", "timestamp": "2026-01-06T16:04:00Z", "trace_id": "395e9014-fde4-cd8c-44d1-42071659d2d4" }
{ "account_age_days": 490, "account_id": "ACCT-FF13AD1FE4E2", "baseline_risk_score": 0.197, "kyc_tier": "tier_1", "session_entropy": 0.884 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 257, "timestamp": "2026-01-06T16:04:00Z", "transaction_amount_usd": 8882.65 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.595, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 7276.11, "financial_exposure_usd": 8796.85, "recoverable_pct": 0.879 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109833", "label": "benign", "label_confidence": 0.53, "severity": "medium", "timestamp": "2026-01-07T19:53:00Z", "trace_id": "5ef3b962-e1eb-e4dd-8f1c-3a85ce3d8d2e" }
{ "account_age_days": 1097, "account_id": "ACCT-30D361F6D54D", "baseline_risk_score": 0.078, "kyc_tier": "tier_3", "session_entropy": 0.311 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 327, "timestamp": "2026-01-07T19:53:00Z", "transaction_amount_usd": 8428.55 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.593, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2331.38, "financial_exposure_usd": 3382.17, "recoverable_pct": 0.688 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106389", "label": "fraudulent", "label_confidence": 0.721, "severity": "medium", "timestamp": "2026-01-05T10:29:00Z", "trace_id": "1cc07b52-02c0-8fe8-a342-9b7bc80706dd" }
{ "account_age_days": 905, "account_id": "ACCT-56A1DD56A440", "baseline_risk_score": 0.34, "kyc_tier": "tier_3", "session_entropy": 0.83 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 1048, "timestamp": "2026-01-05T10:29:00Z", "transaction_amount_usd": 2380409.05 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.405, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2678639.94, "financial_exposure_usd": 2916570.77, "recoverable_pct": 0.954 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101010", "label": "fraudulent", "label_confidence": 0.867, "severity": "high", "timestamp": "2026-01-01T16:50:00Z", "trace_id": "2c612bfc-06dd-b464-94dd-71ed1d736c6d" }
{ "account_age_days": 296, "account_id": "ACCT-D3971D36250D", "baseline_risk_score": 0.339, "kyc_tier": "tier_1", "session_entropy": 0.147 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 359, "timestamp": "2026-01-01T16:50:00Z", "transaction_amount_usd": 49532.15 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.78, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 810416.41, "financial_exposure_usd": 856493.44, "recoverable_pct": 0.686 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107511", "label": "benign", "label_confidence": 0.504, "severity": "low", "timestamp": "2026-01-06T05:11:00Z", "trace_id": "f9c08742-7ac2-0848-83cf-6c00aad2b739" }
{ "account_age_days": 1965, "account_id": "ACCT-341AED3A1589", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.545 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 988, "timestamp": "2026-01-06T05:11:00Z", "transaction_amount_usd": 12419.23 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.683, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 582.53, "financial_exposure_usd": 598.85, "recoverable_pct": 0.453 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102307", "label": "fraudulent", "label_confidence": 0.931, "severity": "medium", "timestamp": "2026-01-02T14:27:00Z", "trace_id": "dca3f5ac-6b05-5192-7f77-380e366016a7" }
{ "account_age_days": 500, "account_id": "ACCT-F1EC8DF7B178", "baseline_risk_score": 0.461, "kyc_tier": "tier_2", "session_entropy": 0.659 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 99, "timestamp": "2026-01-02T14:27:00Z", "transaction_amount_usd": 105842.83 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.713, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 381100.57, "financial_exposure_usd": 703623.28, "recoverable_pct": 0.601 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100618", "label": "fraudulent", "label_confidence": 0.941, "severity": "high", "timestamp": "2026-01-01T10:18:00Z", "trace_id": "7b7cfb7f-0a20-cadc-cbcc-a54b65d67be4" }
{ "account_age_days": 446, "account_id": "ACCT-45044404FB7A", "baseline_risk_score": 0.502, "kyc_tier": "tier_2", "session_entropy": 0.74 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 748, "timestamp": "2026-01-01T10:18:00Z", "transaction_amount_usd": 118201.24 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.942, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 500577.47, "financial_exposure_usd": 728828.76, "recoverable_pct": 0.298 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108357", "label": "benign", "label_confidence": 0.612, "severity": "medium", "timestamp": "2026-01-06T19:17:00Z", "trace_id": "1a90b972-ccb0-4eef-ca86-8d1eec8f222a" }
{ "account_age_days": 954, "account_id": "ACCT-084A77CC0D34", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.643 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 879, "timestamp": "2026-01-06T19:17:00Z", "transaction_amount_usd": 9873.17 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.685, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3974.06, "financial_exposure_usd": 5380.23, "recoverable_pct": 0.571 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108073", "label": "benign", "label_confidence": 0.596, "severity": "low", "timestamp": "2026-01-06T14:33:00Z", "trace_id": "7f57d8b6-4ebf-20c7-4e8d-7880e7c8c1dc" }
{ "account_age_days": 864, "account_id": "ACCT-2D80D34D3623", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.538 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 343, "timestamp": "2026-01-06T14:33:00Z", "transaction_amount_usd": 12699.82 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.503, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2908.99, "financial_exposure_usd": 3635.92, "recoverable_pct": 0.546 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109109", "label": "benign", "label_confidence": 0.72, "severity": "low", "timestamp": "2026-01-07T07:49:00Z", "trace_id": "dc60d8ab-7bca-6213-9d1f-45db01f8784a" }
{ "account_age_days": 185, "account_id": "ACCT-C5840131C688", "baseline_risk_score": 0.134, "kyc_tier": "tier_3", "session_entropy": 0.277 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 721, "timestamp": "2026-01-07T07:49:00Z", "transaction_amount_usd": 1982.87 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.641, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1511.26, "financial_exposure_usd": 3761.09, "recoverable_pct": 0.652 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109788", "label": "benign", "label_confidence": 0.559, "severity": "low", "timestamp": "2026-01-07T19:08:00Z", "trace_id": "6de4f61f-1df5-4562-4e9b-2f2f04b5106d" }
{ "account_age_days": 1646, "account_id": "ACCT-4CF7B2D82A97", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.593 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 279, "timestamp": "2026-01-07T19:08:00Z", "transaction_amount_usd": 12167.72 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.754, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2040.6, "financial_exposure_usd": 2936.26, "recoverable_pct": 0.44 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108594", "label": "benign", "label_confidence": 0.596, "severity": "medium", "timestamp": "2026-01-06T23:14:00Z", "trace_id": "82ddddc4-99d5-7e17-92f1-8b67d08fcf27" }
{ "account_age_days": 472, "account_id": "ACCT-1B8DD99183D5", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.855 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 1182, "timestamp": "2026-01-06T23:14:00Z", "transaction_amount_usd": 5010.55 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.554, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2419.86, "financial_exposure_usd": 4228.48, "recoverable_pct": 0.499 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100036", "label": "fraudulent", "label_confidence": 0.93, "severity": "medium", "timestamp": "2026-01-01T00:36:00Z", "trace_id": "95fbe976-ae00-7b7e-2f8c-83e56e8d9644" }
{ "account_age_days": 1018, "account_id": "ACCT-3F2086C2F1B8", "baseline_risk_score": 0.37, "kyc_tier": "tier_3", "session_entropy": 0.713 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 248, "timestamp": "2026-01-01T00:36:00Z", "transaction_amount_usd": 92774 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.467, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 506020.65, "financial_exposure_usd": 1051375.97, "recoverable_pct": 0.006 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107654", "label": "benign", "label_confidence": 0.649, "severity": "low", "timestamp": "2026-01-06T07:34:00Z", "trace_id": "24c61d86-b259-cbe6-0a06-b595daba3584" }
{ "account_age_days": 434, "account_id": "ACCT-DDEC0A49760D", "baseline_risk_score": 0.136, "kyc_tier": "tier_3", "session_entropy": 0.686 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 864, "timestamp": "2026-01-06T07:34:00Z", "transaction_amount_usd": 795.35 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.492, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1414.68, "financial_exposure_usd": 2558.74, "recoverable_pct": 0.754 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104298", "label": "fraudulent", "label_confidence": 0.93, "severity": "medium", "timestamp": "2026-01-03T23:38:00Z", "trace_id": "f42a9d1c-4e5e-b79d-806e-5eadfc47fad7" }
{ "account_age_days": 1595, "account_id": "ACCT-8BA64AFB23C8", "baseline_risk_score": 0.292, "kyc_tier": "tier_1", "session_entropy": 0.281 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 970, "timestamp": "2026-01-03T23:38:00Z", "transaction_amount_usd": 1629013.88 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.555, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1139446.68, "financial_exposure_usd": 2515485.18, "recoverable_pct": 0.77 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101007", "label": "fraudulent", "label_confidence": 0.856, "severity": "critical", "timestamp": "2026-01-01T16:47:00Z", "trace_id": "b908e8e1-8a19-3470-4bbc-9914f824fdd3" }
{ "account_age_days": 1939, "account_id": "ACCT-B5AEBE64CFC8", "baseline_risk_score": 0.645, "kyc_tier": "tier_1", "session_entropy": 0.431 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 546, "timestamp": "2026-01-01T16:47:00Z", "transaction_amount_usd": 71739.66 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.454, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 305342.4, "financial_exposure_usd": 555236.27, "recoverable_pct": 0.402 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107584", "label": "benign", "label_confidence": 0.711, "severity": "low", "timestamp": "2026-01-06T06:24:00Z", "trace_id": "7184fede-c335-5a3f-fca7-e53a412028ee" }
{ "account_age_days": 277, "account_id": "ACCT-0A684B1CC17C", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.876 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 297, "timestamp": "2026-01-06T06:24:00Z", "transaction_amount_usd": 6102.99 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.655, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3528.57, "financial_exposure_usd": 4886.61, "recoverable_pct": 0.564 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109206", "label": "benign", "label_confidence": 0.649, "severity": "low", "timestamp": "2026-01-07T09:26:00Z", "trace_id": "996801e0-50b0-45a5-86ec-24d06a7b8c4e" }
{ "account_age_days": 892, "account_id": "ACCT-8062DE1F6804", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.215 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 1153, "timestamp": "2026-01-07T09:26:00Z", "transaction_amount_usd": 8129.14 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.74, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 916.03, "financial_exposure_usd": 1235.92, "recoverable_pct": 0.915 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100459", "label": "fraudulent", "label_confidence": 0.97, "severity": "critical", "timestamp": "2026-01-01T07:39:00Z", "trace_id": "d244bf37-ee00-9943-2363-ffd7f645fab6" }
{ "account_age_days": 32, "account_id": "ACCT-BB7FD088AD4F", "baseline_risk_score": 0.489, "kyc_tier": "tier_2", "session_entropy": 0.742 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 757, "timestamp": "2026-01-01T07:39:00Z", "transaction_amount_usd": 38149.79 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.368, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 617799.43, "financial_exposure_usd": 1337168.08, "recoverable_pct": 0.131 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102514", "label": "fraudulent", "label_confidence": 0.868, "severity": "critical", "timestamp": "2026-01-02T17:54:00Z", "trace_id": "8999c1a7-e704-5814-0495-24c7d1d391ae" }
{ "account_age_days": 1718, "account_id": "ACCT-651A6123FF70", "baseline_risk_score": 0.486, "kyc_tier": "tier_2", "session_entropy": 0.249 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 539, "timestamp": "2026-01-02T17:54:00Z", "transaction_amount_usd": 81223.99 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.516, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 328978.28, "financial_exposure_usd": 473387.07, "recoverable_pct": 0.171 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107507", "label": "benign", "label_confidence": 0.736, "severity": "low", "timestamp": "2026-01-06T05:07:00Z", "trace_id": "14395814-a566-694a-b4bb-dea097ac6c3b" }
{ "account_age_days": 983, "account_id": "ACCT-F61B4292F247", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.728 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 397, "timestamp": "2026-01-06T05:07:00Z", "transaction_amount_usd": 3858.86 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.549, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1531.01, "financial_exposure_usd": 2203.97, "recoverable_pct": 0.422 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108816", "label": "benign", "label_confidence": 0.495, "severity": "high", "timestamp": "2026-01-07T02:56:00Z", "trace_id": "570ad63c-adae-7acb-4add-2483ba18c924" }
{ "account_age_days": 519, "account_id": "ACCT-2DC587FBD842", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.949 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 1112, "timestamp": "2026-01-07T02:56:00Z", "transaction_amount_usd": 568.47 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.653, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 210.04, "financial_exposure_usd": 512.21, "recoverable_pct": 0.996 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101958", "label": "fraudulent", "label_confidence": 0.807, "severity": "high", "timestamp": "2026-01-02T08:38:00Z", "trace_id": "91dfa536-719f-1fd5-7617-d7b883e2e009" }
{ "account_age_days": 975, "account_id": "ACCT-42D8790565DE", "baseline_risk_score": 0.519, "kyc_tier": "tier_2", "session_entropy": 0.539 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 880, "timestamp": "2026-01-02T08:38:00Z", "transaction_amount_usd": 53654.23 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.498, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 615761.06, "financial_exposure_usd": 731945.42, "recoverable_pct": 0.61 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105578", "label": "fraudulent", "label_confidence": 0.899, "severity": "critical", "timestamp": "2026-01-04T20:58:00Z", "trace_id": "79f75c0e-651f-d35f-67f1-907a0458be84" }
{ "account_age_days": 658, "account_id": "ACCT-F07A0E8D339C", "baseline_risk_score": 0.181, "kyc_tier": "tier_1", "session_entropy": 0.623 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 1106, "timestamp": "2026-01-04T20:58:00Z", "transaction_amount_usd": 2726635.74 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.701, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 6190715.28, "financial_exposure_usd": 7034224.29, "recoverable_pct": 0.6 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101954", "label": "fraudulent", "label_confidence": 0.844, "severity": "medium", "timestamp": "2026-01-02T08:34:00Z", "trace_id": "8422d22e-7d77-2ac3-ecae-a20bf9c727db" }
{ "account_age_days": 16, "account_id": "ACCT-CC7987D427EA", "baseline_risk_score": 0.273, "kyc_tier": "tier_3", "session_entropy": 0.209 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 509, "timestamp": "2026-01-02T08:34:00Z", "transaction_amount_usd": 46938.86 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.578, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 591133.35, "financial_exposure_usd": 1182138.02, "recoverable_pct": 0.695 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109709", "label": "benign", "label_confidence": 0.626, "severity": "high", "timestamp": "2026-01-07T17:49:00Z", "trace_id": "c7935700-8c36-d1ef-93bd-0c61cd90ab93" }
{ "account_age_days": 536, "account_id": "ACCT-984DB67992A3", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.391 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 152, "timestamp": "2026-01-07T17:49:00Z", "transaction_amount_usd": 7744.44 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.772, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3968.38, "financial_exposure_usd": 4087.16, "recoverable_pct": 0.915 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109850", "label": "benign", "label_confidence": 0.709, "severity": "medium", "timestamp": "2026-01-07T20:10:00Z", "trace_id": "7f541bf6-d1cf-de6c-7875-d1d53ec4a430" }
{ "account_age_days": 798, "account_id": "ACCT-12B4B8E64B49", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.581 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 491, "timestamp": "2026-01-07T20:10:00Z", "transaction_amount_usd": 950.32 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.483, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1072.21, "financial_exposure_usd": 2540.63, "recoverable_pct": 0.942 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105134", "label": "fraudulent", "label_confidence": 0.692, "severity": "high", "timestamp": "2026-01-04T13:34:00Z", "trace_id": "6ce51eeb-681b-adb0-9150-59e0d0bdbdf1" }
{ "account_age_days": 931, "account_id": "ACCT-46FBC08FDF19", "baseline_risk_score": 0.133, "kyc_tier": "tier_3", "session_entropy": 0.756 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 305, "timestamp": "2026-01-04T13:34:00Z", "transaction_amount_usd": 1129357.14 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.447, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 5796940.88, "financial_exposure_usd": 7446005.14, "recoverable_pct": 0.535 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105982", "label": "fraudulent", "label_confidence": 0.615, "severity": "low", "timestamp": "2026-01-05T03:42:00Z", "trace_id": "05c9efd0-c936-2753-ac8e-100b586cb884" }
{ "account_age_days": 1073, "account_id": "ACCT-74C6906135C6", "baseline_risk_score": 0.37, "kyc_tier": "tier_2", "session_entropy": 0.329 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 306, "timestamp": "2026-01-04T20:50:00Z", "transaction_amount_usd": 17.81 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.855, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1167185.96, "financial_exposure_usd": 1626948.64, "recoverable_pct": 0.504 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102619", "label": "fraudulent", "label_confidence": 0.753, "severity": "high", "timestamp": "2026-01-02T19:39:00Z", "trace_id": "1cda5c0d-b7ef-2bb1-103b-bf9853b4065d" }
{ "account_age_days": 1255, "account_id": "ACCT-41EFD9CE266C", "baseline_risk_score": 0.595, "kyc_tier": "tier_2", "session_entropy": 0.789 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 632, "timestamp": "2026-01-02T19:39:00Z", "transaction_amount_usd": 60347.41 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.56, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 127058.47, "financial_exposure_usd": 139423.19, "recoverable_pct": 0.638 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102449", "label": "fraudulent", "label_confidence": 0.879, "severity": "high", "timestamp": "2026-01-02T16:49:00Z", "trace_id": "44f4970f-dcf2-3c22-3f4a-c53dfeeed4b2" }
{ "account_age_days": 165, "account_id": "ACCT-84A5A75E4FB8", "baseline_risk_score": 0.515, "kyc_tier": "tier_1", "session_entropy": 0.52 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 350, "timestamp": "2026-01-02T14:14:00Z", "transaction_amount_usd": 9.19 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.578, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 431223.67, "financial_exposure_usd": 726130.31, "recoverable_pct": 0.146 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105990", "label": "fraudulent", "label_confidence": 0.873, "severity": "high", "timestamp": "2026-01-05T03:50:00Z", "trace_id": "f5c26c82-d4c1-65a5-c27b-e1f536e7e1f3" }
{ "account_age_days": 852, "account_id": "ACCT-C198116BF208", "baseline_risk_score": 0.298, "kyc_tier": "tier_1", "session_entropy": 0.1 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 751, "timestamp": "2026-01-05T03:50:00Z", "transaction_amount_usd": 1463686.94 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.372, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3251787.12, "financial_exposure_usd": 3547820.51, "recoverable_pct": 0.852 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102643", "label": "fraudulent", "label_confidence": 0.934, "severity": "high", "timestamp": "2026-01-02T20:03:00Z", "trace_id": "ee2fdae4-6134-9cd1-8c4b-dd07802a3995" }
{ "account_age_days": 1428, "account_id": "ACCT-9C767066E56F", "baseline_risk_score": 0.399, "kyc_tier": "tier_2", "session_entropy": 0.321 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 172, "timestamp": "2026-01-02T08:07:00Z", "transaction_amount_usd": 19.64 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.376, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 698047.35, "financial_exposure_usd": 938141.67, "recoverable_pct": 0.425 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105024", "label": "fraudulent", "label_confidence": 0.839, "severity": "high", "timestamp": "2026-01-04T11:44:00Z", "trace_id": "5c3a6819-6204-0ccd-0a56-fedb5d83edad" }
{ "account_age_days": 1361, "account_id": "ACCT-4B04EF52963F", "baseline_risk_score": 0.399, "kyc_tier": "tier_2", "session_entropy": 0.219 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 1018, "timestamp": "2026-01-04T11:44:00Z", "transaction_amount_usd": 1571266.92 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.609, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3589129.05, "financial_exposure_usd": 7475297.17, "recoverable_pct": 0.53 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109599", "label": "benign", "label_confidence": 0.637, "severity": "medium", "timestamp": "2026-01-07T15:59:00Z", "trace_id": "4f524975-5b3f-ec0d-a8c9-90d6dd39869b" }
{ "account_age_days": 1201, "account_id": "ACCT-46EA94FCFA72", "baseline_risk_score": 0.076, "kyc_tier": "tier_2", "session_entropy": 0.643 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 517, "timestamp": "2026-01-07T15:59:00Z", "transaction_amount_usd": 9608.69 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.676, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2378.56, "financial_exposure_usd": 2703.88, "recoverable_pct": 0.53 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106632", "label": "fraudulent", "label_confidence": 0.766, "severity": "low", "timestamp": "2026-01-05T14:32:00Z", "trace_id": "48785740-59d4-d69e-0a01-149b0e0c1333" }
{ "account_age_days": 70, "account_id": "ACCT-5F95EDDE5065", "baseline_risk_score": 0.287, "kyc_tier": "tier_1", "session_entropy": 0.84 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 134, "timestamp": "2026-01-05T03:53:00Z", "transaction_amount_usd": 3.74 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.441, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1082131.57, "financial_exposure_usd": 2227695.09, "recoverable_pct": 0.497 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105241", "label": "fraudulent", "label_confidence": 0.719, "severity": "medium", "timestamp": "2026-01-04T15:21:00Z", "trace_id": "dba7ef5f-11f6-caaa-b996-dbfe64ad6bb2" }
{ "account_age_days": 758, "account_id": "ACCT-3B9909383E5D", "baseline_risk_score": 0.273, "kyc_tier": "tier_3", "session_entropy": 0.174 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 102, "timestamp": "2026-01-04T15:21:00Z", "transaction_amount_usd": 1106773.25 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.803, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2448655.67, "financial_exposure_usd": 2888349.68, "recoverable_pct": 0.785 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109586", "label": "benign", "label_confidence": 0.638, "severity": "low", "timestamp": "2026-01-07T15:46:00Z", "trace_id": "eef304d7-b641-97f0-d632-32a04fd12ee9" }
{ "account_age_days": 124, "account_id": "ACCT-7EDEAC4A63B3", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.874 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 372, "timestamp": "2026-01-07T11:23:00Z", "transaction_amount_usd": 8.38 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.686, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1480.75, "financial_exposure_usd": 1645.25, "recoverable_pct": 0.82 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104983", "label": "fraudulent", "label_confidence": 0.801, "severity": "critical", "timestamp": "2026-01-04T11:03:00Z", "trace_id": "58009e72-eb93-ceb2-2da8-94449ff86f93" }
{ "account_age_days": 1121, "account_id": "ACCT-432894F0D654", "baseline_risk_score": 0.063, "kyc_tier": "tier_2", "session_entropy": 0.339 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 226, "timestamp": "2026-01-04T08:02:00Z", "transaction_amount_usd": 21.43 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.362, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1514506.71, "financial_exposure_usd": 2586008.09, "recoverable_pct": 0.922 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108213", "label": "benign", "label_confidence": 0.559, "severity": "low", "timestamp": "2026-01-06T16:53:00Z", "trace_id": "4e62987e-73cf-8b62-be0a-4e259bf35a1a" }
{ "account_age_days": 364, "account_id": "ACCT-36E43F6E043E", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.721 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 402, "timestamp": "2026-01-06T16:53:00Z", "transaction_amount_usd": 11208.23 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.647, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2054.09, "financial_exposure_usd": 2913.18, "recoverable_pct": 0.846 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101306", "label": "fraudulent", "label_confidence": 0.823, "severity": "high", "timestamp": "2026-01-01T21:46:00Z", "trace_id": "1136d7a8-154e-e5da-7b1d-374f28c45f83" }
{ "account_age_days": 677, "account_id": "ACCT-BFA030E13C6E", "baseline_risk_score": 0.63, "kyc_tier": "tier_1", "session_entropy": 0.874 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 157, "timestamp": "2026-01-01T21:46:00Z", "transaction_amount_usd": 94608.36 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.651, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 347327.19, "financial_exposure_usd": 854078.37, "recoverable_pct": 0.832 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }